At this rate, between North Korea, Charlottesville and the climate crisis, it's unclear if America can survive being too much "greater", as the political cartoonists in PDiddie's latest weekly collection illustrate...

On today's BradCast, a stunning story of remarkably lax Department of Defense oversight of lethal weaponry given away for free to state and local law enforcement agencies, and the government office which discovered the horrifying failure. [Audio link to complete show follows below.]

But, before and after that story, a few more sordid tales of government dysfunction, including: The U.S. Senate confirmation of a new FBI Director; Keystone XL pipeline may never get built after all; EPA loses in court attempting to roll back methane regulation; Earth is in very very big trouble (or, at least those of us who live on it are); GOP "voter fraud" fraudster and federal court scofflaw Kris Kobach's latest "bizarre" court appeal to avoid an under-oath deposition; and fired White House Comms Director Anthony Scaramucci's terrible week gets even worse.

As to our main story today: The U.S. Government Accountability Office (GAO) recently set up a phony law enforcement agency website and was able to use it to obtain over one million dollars worth of military-grade equipment and weaponry via the Pentagon's so-called 1033 program. The Department of Defense program offers everything from surplus mine-resistant armored vehicles, to high-powered assault weaponry and even helicopters and airplanes to state and local law enforcement agencies --- for free. The program, as of 2014, had doled out more than $5 billion in such equipment.

We're joined today by ZINA MERRITT, who, as Director of Defense Capabilities and Management at the GAO, helped create the disturbingly successful sting operation and the accompanying report on what happened, including recommendations to keep it from happening again. She also testified before Congress about all of this last week. The DoD's controversial 1033 program gained notoriety in 2014, during the protests in Ferguson, MO, when St. Louis County's police force rolled out tactical military gear and weaponry in response.

Merritt explains how the sting --- which netted "over 100 controlled items with an estimated value of $1.2 million, including night-vision goggles, simulated rifles, and simulated pipe bombs" --- was carried out, and what she describes as the "systematic breakdown in the controls at every level." The GAO had been tasked by Congress, during reforms to the program instituted under Obama, to probe the DoD unit where fake law enforcement officials were able to obtain real gear with a fake website and fake IDs (which weren't even checked at several of the warehouses when they picked up what could have been lethal equipment. Good thing they weren't attempting to vote!)

"We submitted [the application] online, and all you had to have, in order to do that, was a website as well as a point of contact, a physical location, and actual names --- points of contact --- within the agency. Also, you had to identify how many particular sworn officials that you have as a part of your agency. So we created all of that and submitted it," Merritt tells me, explaining that apparently none of it was actually verified by the DoD. "The actual physical location that we provided was an empty lot," she says.

Merritt also explains the recent reforms that have been made to the program, via Executive Order by Obama in 2016 (grenade launchers, for example, are no longer available, even though the Los Angeles Unified School District had obtained several prior to those reforms!), the several recommendations the GAO has now made to correct the startling security gaps in the program revealed by the sting operation, and whether "bad guys" may have already pulled off what the GAO has now discovered was easily done.

We also discuss how the 1033 program could be changed again by Trump, and whether the GAO --- an agency controlled by the U.S. Congress --- is facing changes under the new Administration...

While we post The BradCast here every day, and you can hear it across all of our great affiliate stations and websites, to automagically get new episodes as soon as they're available sent right to your computer or personal device, subscribe for free at iTunes, Stitcher, TuneIn or our native RSS feed!

Voter ID laws helped contribute to lower voter turnout in Kansas and Tennessee in 2012, according a new study by the Government Accountability Office.

Congress's research arm blamed the two states' laws requiring that voters show identification on a dip in turnout in 2012 - about 2 percentage points in Kansas and between 2.2 and 3.2 percentage points in Tennessee. Those declines were greater among younger and African-American voters, when compared to turnout in other states.
...
"This new analysis from GAO reaffirms what many in Congress already know: Threats to the right to vote still exist," [Senator Patrick Leahy (D-VT)] said in a statement. "That is why Congress must act to restore the fundamental protections of the Voting Rights Act that have been gutted by the Supreme Court."

The report, according to Leahy's full statement, "also found scant evidence of voter fraud that the new laws that ostensibly are designed to discourage."

I'm on a number of deadlines today, so haven't gotten to peruse the actual report yet, but let me note a quick point or two, based on The Hill's reporting on the GAO study, which was requested by Democratic Senators Leahy (VT), Durbin (IL), Schumer (NY), Nelson (FL) and independent Sanders (VT), all of whom are co-sponsoring legislation to fix the part of the Voting Rights Act that the U.S. Supreme Court gutted last year in its notorious 5-4 decision...

Neither the recent claim made by anonymous hacker, Abhaxas, that he/she had hacked into Florida's e-voting database nor the efforts by FL election officials to minimize the breach of its system comes as a surprise to The BRAD BLOG.

In fact, minimization of the vulnerability following the reported hack calls to mind what Roger G. Johnston, Ph.D of the Argonne National Laboratory describes as the Arrogance Maxim:

The ease of defeating a security device or system is proportional to how confident/arrogant the designer, manufacturer, or user is about it, and to how often they use words like "impossible" or "tamper-proof".

One would think that Abhaxas had Johnson's Arrogance Maxim in mind. As reported by Doug Chapin of the University of MN, the anonymous hacktivist responded to the official denials by hacking into the FL voting system a second time; posting "a directory listing of the Florida database with the (sarcastic) observation 'Glad you cleaned up, pretty secure now guys'."

As an encore, Abhaxas then hacked into Montana's government website, where he/she exposed 16 databases.

While Chapin acknowledges the vulnerability exposed by the hack, once again, as is his habit over the years, Chapin draws the entirely wrong lessons in pointing to the need for better training and security procedures...

It is now a bit fun watching some previously silent news organizations fall all over themselves as they suddenly recognize that our election process is seriously flawed. Today CNN reported, and many smaller organizations picked up the report, that the GAO released a report this week on voting system testing that finds that the Election Assistance Commission [EAC] has not notified election officials across the country about electronic voting machine failures.

This has been no secret within the Election Integrity community and has been one of our main complaints about the EAC. Voting systems fail and the EAC does nothing about it. They argue instead that none of the voting systems were certified by the EAC so they have no right/mandate to do anything about them. The GAO recommends that congress step in with legislation to force this issue.

We agree but dislike the fact that we have to wait on a snail-slow congress to do anything. CNN also reports on the CommonCause/Century Foundation report that was also released this week and that points to 10 states that they believe will have problems in Nov. My guess is that the “ten states” will grow substantially to 40 or more by election day and on beyond.

Also in the news is that the re-re-recount of ballots in Palm Beach Co Florida is taking place today and tomorrow. One can only guess what they are going to find. Ballots from 2004? Punch cards with hanging chads?

And a member of the Washington DC council has subpoenaed Sequoia for records that may reveal what really happened in the recent primary. Could it be that the council will find that the Sequoia spokeswoman, Michelle Shafer’s, declaration that the company is not at fault; “No, no, no” is really “Yes, yes, yes”? ...

My report opinion piece over there today offers details and analysis of that new report, and how it underscores --- yet again --- that our increasingly complicated system of voting in America would be immeasurably and immediately simplified by doing away with all dangerously disenfranchising, demonstrably unreliable, historically inaccurate, and easily hackable Direct Recording Electronic (DRE, usually touch-screen) voting systems.

My CW article today also points to earlier ignored GAO reports --- covered only by The BRAD BLOG when they were released --- but again referred to in the latest GAO report and worth underscoring here again, since few noticed the first time. To wit:

We concluded in 2005 that these concerns have caused problems with recent elections, resulting in the loss and miscount of votes.

Hello? [Thump-thump] Is this thing on?...

One last point to recommend my piece over there today: It offers fresh criticism of the EAC's latest woeful claim ("We can't decertify something we didn't certify"), and a related hint or two at an upcoming long-in-the-work investigative report we've been working on at The BRAD BLOG.

We've now been able to gather a great deal of additional information concerning details about the story we first posted yesterday on the official Pennsylvania state warning issued about the new "security vulnerability" discovered in all Diebold touch-screen electronic voting machines.

That warning, which has now brought a lock-down on all Diebold systems in PA, where early absentee (non-machine) voting is about to begin prior to their upcoming May 16th primary election, was reported by the Morning Call yesterday. The warning says the serious security vulnerability could allow ''unauthorized software to be loaded on to the system."

Public details about the warning are still sketchy as those in the know have acknowledged that the problem is so serious, they are hoping to keep the info under wraps until mitigation steps can be taken to safeguard systems.

The BRAD BLOG has been told on the record, however, by one person involved in the matter, that the vulnerability is a "major national security risk."

We've been speaking to many sources today, and we've been able to get several first hand comments on the problem from top officials and analysts directly involved in both state and federal certification of the Diebold systems, as well as from those involved in the initial discovery of the problem.

What's clear is that Morning Call's reporting that it was Diebold who found the "glitch" are flat wrong. The discovery of the "glitch" (which is anything but) emanated from the examination of Diebold AccuVote TSx (touch-screen) machines recently in Emery County, UT.

A source has told The BRAD BLOG that Diebold was "cornered" into admitting to the problem, a far cry from them having "found" it, as the Morning Call characterized it.

What's also clear is that neither Diebold themselves, nor federal officials at the Elections Assistance Commission (EAC) have been notifying states about the serious problem which apparently affects all Diebold AccuVote touch-screen systems, including both their newer TSx models, and the older TS and TS6 models.

The Diebold TSx models, with the security vulnerability still intact, were apparently used in the primary election last Tuesday in Ohio.

A document at Diebold's website describes [PDF] the TSx models as featuring "Industry Leading Security."

In Utah's Emery County, state officials are attempting to force Bruce Funk, the 23-year elected County Clerk out of his job in the wake of his having allowed a security evaluation of the county's new Diebold touch-screen systems by both computer security firm Security Innovation and Finnish computer security expert Harri Hursti. According to several sources, that analysis revealed many new vulnerabilities and problems in the Diebold touch-screen systems, including the one that seems to be at the heart of the problem now being warned about by Pennsylvania officials.

Funk --- who has since been "vilified," as one source told us, by both Diebold and Utah state officials as high as the Lt. Governor --- was forced to implement the new Diebold touch-screen systems for the first time this year against his own objections. His prudent subsequent security evaluation of the systems was arranged by electronic voting watchdog organization, BlackBoxVoting.org. (We recently interviewed Funk on the radio concerning that evaluation, and his subsequent removal from office in its wake. Listen to that interview here [MP3].)

Here's some of what we've so far been able to learn from a number of officials, both on the record and off, in Pennsylvania, elsewhere around the country and at the federal level, as well as those involved in the initial Emery County discoveries...

Wired Magazine is now reporting that three Members of the U.S. House of Representatives Judiciary Committee are now calling for an investigation of the troubling incidents that we've been reporting concerning irregularities in Tuesday's vote counting!:

Three congressmen sent a letter to the General Accounting Office on Friday requesting an investigation into irregularities with voting machines used in Tuesday's elections.

The congressmen, Democratic members of the House of Representatives from Florida, New York and Michigan, cited a number of incidents that came to light in the days after the election. One was a glitch in Ohio that caused a memory card reader made by Danaher Controls to give George W. Bush 3,893 more votes than he should have received. Another was a problem with memory cards in North Carolina that caused machines made by UniLect to lose 4,500 votes cast on e-voting machines. The votes were lost when the number of votes cast on the machines exceeded the capacity of the memory cards.

There were also problems with machines that counted absentee ballots in Florida. Software made by Election Systems & Software began subtracting votes when totals surpassed 32,000. Officials said the problem affected only certain countywide races on one of the last pages of the ballot. Elections officials knew about the problem two years ago, but the company failed to fix the software before the election this year.

Reports from voters in Florida and Ohio also indicated that some of them had problems voting for the candidate of their choice. When they tried to vote for John Kerry, they said, the machine either wouldn't register the vote at all or would indicate on the review page that the vote was cast for Bush instead.

...That the proposed changes in FCC fines for "indecent speech" currently moving through Congress and chilling broadcasters will change the penalty for individual performers (not the stations owners!) from the current $11,000 after a first-warning to a whopping $500,000 per incident with no warning whatsoever? Read about it here, since MSNBC hasn't gone out of their way to tell you about it.

...That, according to an audit by the US Governmental Accounting Office (GAO), the vast majority of companies in America didn't pay any federal income taxes at all from 1996 to 2000? Read about it here, since Dubya keeps forgetting to mention it.

...That despite what you may have heard from the majority of the Media (controlled almost exclusively by Conservatives) about George W. Bush still being ahead of John Kerry, that Kerry actually leads Bush in the two most recently released polls? Read about it here, since Sean Hannity forgot to announce it.

...That Great Britain's conservative newspaper, The Independent, reports that a former translator for the FBI with top-secret security clearance testified to the 9/11 Commission that she "saw papers that show US knew al-Qa'ida would attack cities with aeroplanes" and that she gave the Commission "details of specific investigation files, the specific dates, specific target information, specific managers in charge of the investigation....everything so that they could go back and follow up. This is not hearsay. These are things that are documented. These things can be established very easily." Which, of course, makes Condi Rice's claims that "we could never have foreseen planes being used as missiles" even more incredible than they already were? Read about it here, since Scott McClellan keeps leaving these things out of his morning briefings.

...That if Donald Trump is as good a businessman as he would like us to believe, he will see to it that hot couple Amy and Nick will be the final two contestants left on The Apprentice? No need to read about it anywhere else, cuz I just told you, and you've got other reading to do!